INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.12' (ECDSA) to the list of known hosts. 2018/04/13 21:19:19 fuzzer started 2018/04/13 21:19:20 dialing manager at 10.128.0.26:36243 2018/04/13 21:19:26 kcov=true, comps=false 2018/04/13 21:19:30 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000240)='./file0/file0\x00', 0x48082, 0x0) open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) 2018/04/13 21:19:30 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000380)={@link_local={0x1, 0x80, 0xc2}, @random="b6992d0c6767", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @broadcast=0xffffffff}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x8, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}}}}}}, 0x0) 2018/04/13 21:19:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000017000)={0xa}, 0x1c) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00'}) syz_emit_ethernet(0x6e, &(0x7f00000f8000)={@random="cd390b081bf2", @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @loopback={0x0, 0x1}, @loopback={0x0, 0x1}, [], "fca967e17f791010"}}}}}}}, 0x0) 2018/04/13 21:19:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) 2018/04/13 21:19:30 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) shmdt(0x0) 2018/04/13 21:19:30 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="cf57c22155f0aaaaaaaaaabb080600010800060400010180c2000000ac142300aaaaaaaaaabbac1414aa"], 0x0) 2018/04/13 21:19:30 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00009ecff8), 0x2, 0x0) 2018/04/13 21:19:30 executing program 6: msgget$private(0x0, 0x0) syzkaller login: [ 49.489633] ip (3756) used greatest stack depth: 54672 bytes left [ 50.795810] ip (3881) used greatest stack depth: 54200 bytes left [ 51.285751] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.292312] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.341235] device bridge_slave_0 entered promiscuous mode [ 51.430743] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.437388] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.471368] device bridge_slave_0 entered promiscuous mode [ 51.498999] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.505592] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.545163] device bridge_slave_0 entered promiscuous mode [ 51.593279] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.599857] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.618909] device bridge_slave_1 entered promiscuous mode [ 51.637781] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.644322] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.662986] device bridge_slave_0 entered promiscuous mode [ 51.686480] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.692986] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.701272] device bridge_slave_0 entered promiscuous mode [ 51.712485] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.718978] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.752570] device bridge_slave_1 entered promiscuous mode [ 51.766403] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.772903] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.800980] device bridge_slave_1 entered promiscuous mode [ 51.826840] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.833364] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.850436] device bridge_slave_0 entered promiscuous mode [ 51.864233] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.871447] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.882386] device bridge_slave_0 entered promiscuous mode [ 51.893199] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 51.904535] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.911022] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.940194] device bridge_slave_1 entered promiscuous mode [ 51.949555] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 51.959312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 51.967955] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.974455] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.003452] device bridge_slave_1 entered promiscuous mode [ 52.010219] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.016743] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.042357] device bridge_slave_0 entered promiscuous mode [ 52.070892] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.077466] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.120427] device bridge_slave_1 entered promiscuous mode [ 52.137617] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.144619] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.168231] device bridge_slave_1 entered promiscuous mode [ 52.178683] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 52.188661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 52.198665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 52.208440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 52.218966] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 52.227497] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.234141] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.296131] device bridge_slave_1 entered promiscuous mode [ 52.324664] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 52.333382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 52.383182] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 52.451944] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 52.468696] ip (3992) used greatest stack depth: 53960 bytes left [ 52.511508] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 52.553161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 52.573314] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 52.773277] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 53.189420] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 53.198619] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 53.276301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 53.324612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 53.371651] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 53.391435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 53.527662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 53.537749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 53.546965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 53.564377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 53.732763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 53.758933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 53.787540] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 53.847383] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 53.994564] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 54.079767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 54.417529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 54.426350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 54.568904] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 54.627771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 54.667072] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 54.678987] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 54.700973] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 54.803821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 54.836956] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 54.847320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.865992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.907264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 54.916285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 54.924391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 54.934291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.961885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.995183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 55.031734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 55.056501] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 55.063792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.074816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.136439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.144584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 55.151594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.162118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.180206] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.188350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 55.195572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.220510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.271717] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 55.279219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.290842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.321509] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 55.329251] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 55.338728] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 55.346393] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 55.368302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.386663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.418317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.451328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.473477] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.482110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.504400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.531412] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 55.541298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.558451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.580402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.588443] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.598946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.614836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.647985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.671911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.692980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 55.706653] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.713848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.741688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.776900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.796623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.810178] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.817642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.835199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.880302] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.889395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.914269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.694352] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.700898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.707853] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.714361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.754088] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.762090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.785391] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.791928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.798810] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.805299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.862097] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.946314] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.952828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.959748] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.966189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.999980] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 58.115951] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.122484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.129397] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.135916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.195170] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 58.209096] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.215597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.222475] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.228978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.266753] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 58.274932] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.281432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.288324] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.294810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.308808] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 58.329465] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.335981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.342872] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.349357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.407204] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 58.414697] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.421183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.428089] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.434569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.486263] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 58.783555] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.797166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.838741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.865811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.881519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.889090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.896901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.306800] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 67.391718] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 67.706601] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 67.763405] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.083526] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.098338] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.104632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.117096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.171963] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.187117] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.193535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.205335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.263930] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.396294] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.620579] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.626974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.637728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.668432] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.675135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.704851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.942385] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.948687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.962795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.007737] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.014174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.033260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.095484] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.101824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.119789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.255642] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.261966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.275550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/13 21:19:57 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x83, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xa09}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) [ 74.673460] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.680452] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.950769] audit: type=1326 audit(1523654397.949:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5764 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455319 code=0xffff0000 2018/04/13 21:19:58 executing program 7: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000000180c200000086dd6032d2d900070100fe800000000000010000000000000000ff020000000000000000000000000001040090780000000060e6b4160000000000000000000000000000ffffac141400fe8000000000000000000000000000bb4ea06925a315cdc3b0acc558aa75cb9a53637d251501c89ebe12fe599623d2cbdc399bd22dcc87973d98ebc081416b6f16a570c8e51baadc403ae1109b79266c0cea62404a873d82918491b8fa996ccdf816a3e3632de2e7bd7b8c2b68819a"], &(0x7f0000001580)) 2018/04/13 21:19:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000017000)={0xa}, 0x1c) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00'}) syz_emit_ethernet(0x6e, &(0x7f00000f8000)={@random="cd390b081bf2", @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @loopback={0x0, 0x1}, @loopback={0x0, 0x1}, [], "fca967e17f791010"}}}}}}}, 0x0) 2018/04/13 21:19:58 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) fstat(r0, &(0x7f00000003c0)) 2018/04/13 21:19:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000100)=@abs, 0x6e) 2018/04/13 21:19:58 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4204, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000500)=""/4096, 0x1000}) 2018/04/13 21:19:58 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000017000)={0xa}, 0x1c) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00'}) syz_emit_ethernet(0x6e, &(0x7f00000f8000)={@random="cd390b081bf2", @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @loopback={0x0, 0x1}, @loopback={0x0, 0x1}, [], "fca967e17f791010"}}}}}}}, 0x0) 2018/04/13 21:19:58 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x5) 2018/04/13 21:19:58 executing program 0: r0 = socket$inet(0x2, 0x4008000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0\x00'}, 0x18) [ 75.723661] audit: type=1326 audit(1523654398.722:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5764 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455319 code=0xffff0000 2018/04/13 21:19:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1000000000000002, 0x44c, 0x400000000003e6, 0x0, 0x0, 0x0, 0x0, 0x8a3, 0x80081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 75.854523] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.861558] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/13 21:19:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='sessionid\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/1, 0x1}], 0x2000000000000021, 0x0) 2018/04/13 21:19:59 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x1080, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) 2018/04/13 21:19:59 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)="a68a7b582baa95a8a4c8120f2a180d3fd6cdc9379d399a4f8b9076b03a5ae13b82396f1aea33eedf9a81ef76d566cdfcc513f6de1b534d6828aff3325d3ad028602637d6884601e82c01c75c66ec34f7df52a4a73d3d427e08f7c4a4cdcd61c098cb9854a4b21a22cd8304ed03b77588af76530aa6e25d93fa7cf9c1f8e1c10e3e54b2", 0x83, 0x0) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140)=[{}], 0x1, &(0x7f0000000180)}, 0x0) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000180), 0x0, 0xfffffffffffffff9) keyctl$describe(0x6, 0x0, &(0x7f0000000100)=""/31, 0x1f) 2018/04/13 21:19:59 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)}, 0x0) 2018/04/13 21:19:59 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000972ffc)=0x1, 0x4) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="898d55a9f2e0f3de603c0ab6", 0xc, 0x4008001, &(0x7f0000000280)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/13 21:19:59 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair(0x1e, 0x805, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$inet_icmp(0x16, 0x26, 0x930000, &(0x7f0000000240)) 2018/04/13 21:19:59 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xe6}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0xb, 0x2, 0x705000, &(0x7f0000000180)) 2018/04/13 21:19:59 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000740)="15", 0x1}], 0x1, &(0x7f0000000880)}, 0x0) 2018/04/13 21:19:59 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000050000005f42485266535f4d", 0x48, 0x10000}], 0x1200011, &(0x7f0000000140)) 2018/04/13 21:19:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="636c6561725f7265667300cfef7424e8008e5e6959c092b653a9eccac0ae4e080e8a81a73ceda2986b556015d9a51351690da59d8b4585155f10e19f25b5dc85e7fcddb4b49befb021afa255df4c5bda1827d9a0828cb5d8cb2558f91119e954c75b366183e1bfe8d875eec3f0bf2c55cc1af7869ee8dd737b9cdde08c") pwrite64(r0, &(0x7f0000000280)='\x00', 0x1, 0x0) 2018/04/13 21:19:59 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x7fd, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000040)=0x101, 0x4) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000100)=0x5ff9, 0x2e8) setsockopt$packet_buf(r2, 0x107, 0xd, &(0x7f0000000180)="7f03c68803ddb372b16f731d4bc7a6c611ea7211403c95297bd86a52ac831cdbd26af78aa27dac6dce7a94d329246b72f63b94b0058a604845fccbe38b9700c989762e7987f9b74392223555ee9ed1f14348964bdf20bc8cb6d1cfc977651811a2467811ac6adfefc61582b08a74b6366b95021c78a1ef0d9864acf4533fe462f9332db1ea75e5ceaa2bb897c298bf5bba4582053f51ea2cdc11a68f0cb05ec497", 0x15) sendto$inet(r1, &(0x7f0000832fff), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmsg(r1, &(0x7f00005b7000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000002b40)}, 0x2020) 2018/04/13 21:19:59 executing program 5: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='Z', 0x1, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x145000, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/64, &(0x7f00000004c0)=0x40) 2018/04/13 21:19:59 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair(0x1e, 0x805, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$inet_icmp(0x16, 0x26, 0x930000, &(0x7f0000000240)) 2018/04/13 21:19:59 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0xbc, "29d6b035d1e7add581b18bcbc1ced36e9b375f63d97491548c57d7c34842defb8d9ad72934e3980c7628e30e6a0d9b9906b89896f1d2a8f1890ae129e123a6007e3870bd664196900f281a281c04bc1f4e0e8ee08cbe5e54543bb16748ff75f97077e8233d3864bb8757b118ab5d8ddd2bde0dd82ce9193cff36b61a37d8dbe17d319a7628ff9223862f218c42b6de3a246ab95772f711ad98bbe5a78491c82c8baf32516d1e0217cbbfdefba75067f1160349850de7387278c4a22d"}, &(0x7f0000000040)=0xc4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={r1, 0x7}, &(0x7f0000000200)=0x8) sendto$inet6(r0, &(0x7f0000000000)="e1", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000bd6ff4)={0x0, 0x0, 0x4000020030}, 0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300)={0x0, 0x1}, 0x8) write(r0, &(0x7f0000cbdfb8)='v', 0x1) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) sendto$inet6(r0, &(0x7f00000000c0)="e5", 0x1, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000340)="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", 0x601) 2018/04/13 21:19:59 executing program 6: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)=0x801) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff}}) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="2f65786500000000000409004bddd9de91be10eebf000ee9a9d50f1e8600000854fa07424adee93707da75af1f0200f5cd26d7a0d2ef6ae0d178621cffc0a87164000000e39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, &(0x7f0000000040)}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0xeb, 0x20, 0x5}) 2018/04/13 21:19:59 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x7ff) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000f65000)=0x3f8, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x40, @empty, 0xc0}}, [0x3ff, 0x8001, 0x5f82, 0x7, 0x0, 0x401, 0x7, 0x8, 0x1, 0x100000001, 0x7641e6f8, 0x3, 0x4, 0x7f, 0x8]}, &(0x7f0000000180)=0x100) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={r3, 0xc1}, 0x8) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}}, 0xffffffffffffff1e) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000002c0)={r3, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x84) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00004aaffc)=0x5, 0x4) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r5 = dup2(r4, r0) ioctl$sock_netrom_TIOCINQ(r5, 0x541b, &(0x7f0000000280)) 2018/04/13 21:19:59 executing program 5: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='Z', 0x1, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x145000, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/64, &(0x7f00000004c0)=0x40) 2018/04/13 21:19:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x2}, 0x1c) connect$inet6(r0, &(0x7f000090b000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x3}, 0x1c) connect(r0, &(0x7f00004f5000)=@ethernet={0x0, @link_local={0x1, 0x80, 0xc2}}, 0x10) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)=ANY=[@ANYBLOB="ffffffffffffcce291ac6a1f9b387f20449cf00180000086e96006f52600081100fe800000000000000000000000"], &(0x7f0000775000)) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x2, 0x8}}}}}}, &(0x7f0000775000)) 2018/04/13 21:20:00 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x304, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x4e23, @multicast1=0xe0000001}, "0008000000759b288842f5ac1f020409"}) 2018/04/13 21:20:00 executing program 3: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000002c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000050000005f42485266535f4d", 0x48, 0x10000}], 0x1200011, &(0x7f0000000380)=ANY=[]) 2018/04/13 21:20:00 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) 2018/04/13 21:20:00 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, 0x0, r1) 2018/04/13 21:20:00 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000001300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) dup(r0) epoll_create1(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4009, 0x0) fallocate(r2, 0x20, 0x0, 0xfffffeff000) 2018/04/13 21:20:00 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)="a68a7b582baa95a8a4c8120f2a180d3fd6cdc9379d399a4f8b9076b03a5ae13b82396f1aea33eedf9a81ef76d566cdfcc513f6de1b534d6828aff3325d3ad028602637d6884601e82c01c75c66ec34f7df52a4a73d3d427e08f7c4a4cdcd61c098cb9854a4b21a22cd8304ed03b77588af76530aa6e25d93fa7cf9c1f8e1c10e3e54b2", 0x83, 0x0) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140)=[{}], 0x1, &(0x7f0000000180)}, 0x0) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000180), 0x0, 0xfffffffffffffff9) keyctl$describe(0x6, 0x0, &(0x7f0000000100)=""/31, 0x1f) 2018/04/13 21:20:00 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)}, 0x0) 2018/04/13 21:20:00 executing program 1: r0 = socket(0x1000000000001e, 0x2, 0x408000) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000080)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000240)=""/115, 0x73}, {&(0x7f00000002c0)=""/72, 0x48}], 0x2, &(0x7f0000000340)=""/247, 0xf7, 0x4}, 0x10000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3, 0x73d}, 0xe1) sendmsg$key(r0, &(0x7f00005af000)={0x0, 0x0, &(0x7f00003f1000)={&(0x7f00007b1000)=ANY=[@ANYBLOB="0200000026ff0000000000009358fdd9"], 0xffe2}, 0x1}, 0x0) recvfrom$inet6(r0, &(0x7f0000000140)=""/131, 0x83, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x3ff}}, 0x1c) 2018/04/13 21:20:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000050000005f42485266535f4d", 0x48, 0x10000}], 0x1200011, &(0x7f0000000140)) 2018/04/13 21:20:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000002700)="400000000002000019000000dc0100002c000000010000000000000000000000000400000000000000000000000000003d5ca35a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)) 2018/04/13 21:20:00 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 21:20:00 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/13 21:20:00 executing program 7: shmat(0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) 2018/04/13 21:20:00 executing program 6: syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2b}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/13 21:20:01 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000040)=""/117, &(0x7f00000000c0)=0x75) 2018/04/13 21:20:01 executing program 3: perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000cccf88)={0x0, 0x3db}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001880)={&(0x7f0000001640)='./file0/file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4000000000004, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000080)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000003c0)=""/165}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x50, &(0x7f0000000180)}, 0x10) socketpair$inet_icmp(0x2, 0xf, 0x930000, &(0x7f0000000000)) 2018/04/13 21:20:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r1, &(0x7f0000818ff0)=[{&(0x7f000016bde8)='\v', 0x1}], 0x1) 2018/04/13 21:20:01 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000c45ff6)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect(r0, &(0x7f000009f000)=@un=@file={0x1, './file0\x00'}, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r2, &(0x7f000097d000), 0xff) 2018/04/13 21:20:01 executing program 6: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2000000000001dc, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x110) 2018/04/13 21:20:01 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)}, 0x0) 2018/04/13 21:20:01 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8010000200000004, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/13 21:20:01 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)="a68a7b582baa95a8a4c8120f2a180d3fd6cdc9379d399a4f8b9076b03a5ae13b82396f1aea33eedf9a81ef76d566cdfcc513f6de1b534d6828aff3325d3ad028602637d6884601e82c01c75c66ec34f7df52a4a73d3d427e08f7c4a4cdcd61c098cb9854a4b21a22cd8304ed03b77588af76530aa6e25d93fa7cf9c1f8e1c10e3e54b2", 0x83, 0x0) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140)=[{}], 0x1, &(0x7f0000000180)}, 0x0) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000180), 0x0, 0xfffffffffffffff9) keyctl$describe(0x6, 0x0, &(0x7f0000000100)=""/31, 0x1f) 2018/04/13 21:20:01 executing program 6: perf_event_open(&(0x7f0000001180)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1c}, 0xfffffeda) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x401000, 0x2, 0xc, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x38}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x23e1000, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/13 21:20:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f0000000140)='.', &(0x7f0000000180)='.', &(0x7f00000001c0)='tmpfs\x00', 0x0, &(0x7f0000000200)="eb810de94c00d3d4475fa5c836c7d5922c9fadcf00ece349f9867b60a73dcafba4a7e6394a863ceb01826747db4e9750ac249d8b49eb58c1beecb3181f33ae8d924f6c79fec4d3480db5353ec18b1aac53d8cef942728c443eb1b7ba8d70bda0f2d797cc4458fc943225bcf190b5b33a52af237113c693c75fbd5769ee1d92e238fe42b5d7a91dad3e82fb3413ccaa603fc71b70bc131dbc9c149278d0ac4471") mkdir(&(0x7f0000000280)='.', 0x0) 2018/04/13 21:20:01 executing program 7: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x2, 0x44031, 0xffffffffffffffff, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000300)=""/191, 0xffffffffffffff09) 2018/04/13 21:20:01 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000140)=@abs={0x1}, 0x6e) 2018/04/13 21:20:01 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8010000200000004, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 78.480738] tmpfs: No value for mount option ' L' [ 78.539294] tmpfs: No value for mount option ' L' 2018/04/13 21:20:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000001400)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) connect(r0, &(0x7f00003cd000)=@ethernet, 0x80) 2018/04/13 21:20:01 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0x0, r0, 0x0) 2018/04/13 21:20:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f0000000140)='.', &(0x7f0000000180)='.', &(0x7f00000001c0)='tmpfs\x00', 0x0, &(0x7f0000000200)="eb810de94c00d3d4475fa5c836c7d5922c9fadcf00ece349f9867b60a73dcafba4a7e6394a863ceb01826747db4e9750ac249d8b49eb58c1beecb3181f33ae8d924f6c79fec4d3480db5353ec18b1aac53d8cef942728c443eb1b7ba8d70bda0f2d797cc4458fc943225bcf190b5b33a52af237113c693c75fbd5769ee1d92e238fe42b5d7a91dad3e82fb3413ccaa603fc71b70bc131dbc9c149278d0ac4471") mkdir(&(0x7f0000000280)='.', 0x0) 2018/04/13 21:20:01 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000dacff8)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000098effc), 0x4) writev(r0, &(0x7f00007f2000)=[{&(0x7f0000001f40)="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", 0x51f}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0xc) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000b40)="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", 0x200}], 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000300)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000003f80)=""/4096, 0x1000}], 0x1}, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)='&', 0x1}], 0x1) write(r0, &(0x7f0000000080)='$', 0x1) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000d40)=""/4096, 0x1000}], 0x1, &(0x7f0000000480)=""/92, 0x5c}, 0x0) 2018/04/13 21:20:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond0\x00', 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000040)=0xffffffff, 0x4) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/13 21:20:01 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) [ 78.800985] tmpfs: No value for mount option ' L' 2018/04/13 21:20:02 executing program 7: semop(0x0, &(0x7f000001a000)=[{}, {}], 0x2) semop(0x0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/205) 2018/04/13 21:20:02 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) connect$inet(r0, &(0x7f00000dcff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 2018/04/13 21:20:02 executing program 3: set_mempolicy(0x2000000002, &(0x7f00000000c0)=0x1, 0x20) mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0xfffffffffffffffd, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='comm\x00') 2018/04/13 21:20:02 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f000029bff8)={0x80000001}, 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, &(0x7f0000c5bff8), 0x8) r1 = getpid() r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/128, 0x80}], 0x34c) tgkill(r1, r2, 0x1) 2018/04/13 21:20:02 executing program 2: socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/04/13 21:20:02 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000dacff8)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000098effc), 0x4) writev(r0, &(0x7f00007f2000)=[{&(0x7f0000001f40)="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", 0x51f}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0xc) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000b40)="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", 0x200}], 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000300)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000003f80)=""/4096, 0x1000}], 0x1}, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)='&', 0x1}], 0x1) write(r0, &(0x7f0000000080)='$', 0x1) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000d40)=""/4096, 0x1000}], 0x1, &(0x7f0000000480)=""/92, 0x5c}, 0x0) 2018/04/13 21:20:02 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)="a68a7b582baa95a8a4c8120f2a180d3fd6cdc9379d399a4f8b9076b03a5ae13b82396f1aea33eedf9a81ef76d566cdfcc513f6de1b534d6828aff3325d3ad028602637d6884601e82c01c75c66ec34f7df52a4a73d3d427e08f7c4a4cdcd61c098cb9854a4b21a22cd8304ed03b77588af76530aa6e25d93fa7cf9c1f8e1c10e3e54b2", 0x83, 0x0) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140)=[{}], 0x1, &(0x7f0000000180)}, 0x0) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000180), 0x0, 0xfffffffffffffff9) keyctl$describe(0x6, 0x0, &(0x7f0000000100)=""/31, 0x1f) 2018/04/13 21:20:02 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)}, 0x0) 2018/04/13 21:20:02 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0)="b822833912c50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xd4}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7fffffffefff, 0x2, 0x1, &(0x7f0000000080)) 2018/04/13 21:20:02 executing program 3: set_mempolicy(0x2000000002, &(0x7f00000000c0)=0x1, 0x20) mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0xfffffffffffffffd, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='comm\x00') 2018/04/13 21:20:02 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 2018/04/13 21:20:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000200)) 2018/04/13 21:20:02 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0)="b822833912c50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xd4}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7fffffffefff, 0x2, 0x1, &(0x7f0000000080)) 2018/04/13 21:20:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0)="b822833912c50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xd4}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7fffffffefff, 0x2, 0x1, &(0x7f0000000080)) 2018/04/13 21:20:03 executing program 2: modify_ldt$write2(0x11, &(0x7f00000000c0)={0x4, 0xffffffff, 0x6000, 0x20, 0x800, 0xffffffff, 0x0, 0x9, 0x7f, 0x6}, 0x10) r0 = socket$inet(0x2, 0x4008000000000001, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) pause() setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth0\x00'}, 0x18) 2018/04/13 21:20:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed817bba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aabfabb695c9867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096fdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b20300"}) 2018/04/13 21:20:03 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x4, &(0x7f0000000040)=0x1) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x4012}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) dup3(r0, r1, 0x0) 2018/04/13 21:20:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003380)=[{{&(0x7f0000002a80)=@hci, 0x80, &(0x7f0000002b80), 0x0, &(0x7f0000002bc0)=""/138, 0x8a}}, {{&(0x7f0000002c80)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000003280), 0x0, &(0x7f0000003300)=""/104, 0x68}}], 0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xffffffffffffff53) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000400)=@getlink={0x28, 0x12, 0x209, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0xf}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:20:03 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000ea5000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 2018/04/13 21:20:03 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) 2018/04/13 21:20:03 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f000029bff8)={0x80000001}, 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, &(0x7f0000c5bff8), 0x8) r1 = getpid() r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/128, 0x80}], 0x34c) tgkill(r1, r2, 0x1) 2018/04/13 21:20:03 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)="a68a7b582baa95a8a4c8120f2a180d3fd6cdc9379d399a4f8b9076b03a5ae13b82396f1aea33eedf9a81ef76d566cdfcc513f6de1b534d6828aff3325d3ad028602637d6884601e82c01c75c66ec34f7df52a4a73d3d427e08f7c4a4cdcd61c098cb9854a4b21a22cd8304ed03b77588af76530aa6e25d93fa7cf9c1f8e1c10e3e54b2", 0x83, 0x0) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140)=[{}], 0x1, &(0x7f0000000180)}, 0x0) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000180), 0x0, 0xfffffffffffffff9) 2018/04/13 21:20:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392de40ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be98c66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20000000, 0x2, 0x1, &(0x7f0000000000)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xb}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x1f000000, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/13 21:20:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed817bba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aabfabb695c9867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096fdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b20300"}) 2018/04/13 21:20:03 executing program 6: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000001c0)="1f0000000104fffff13b54c007110009f30501000b00024000000000020000", 0x1f) 2018/04/13 21:20:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392de40ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be98c66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20000000, 0x2, 0x1, &(0x7f0000000000)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xb}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x1f000000, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/13 21:20:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x84000000004002) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) getpgrp(0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6ba1e6871e1804fda3a83954f325e7412229702c4322efe6319bb1dcff7c901303d7f0abac3e86e158f055aa73b271cf0e8714266c269ce1fbf93ae3cab26288", "f444ca37e53dd2f82497f8dbd8506a3393dd18a6efeb8f1b33ba4b61f65a3c5cdd050d7c08189f091521db04ce588a8796b3e20d49eb0429ff8cbd734d6cab2e", "6e1a44be6d10c4343950801e65f8f351869f87f098c18c4a0211af1e1bd42e32"}) [ 80.515839] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. [ 80.537122] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 21:20:03 executing program 6: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000001c0)="1f0000000104fffff13b54c007110009f30501000b00024000000000020000", 0x1f) 2018/04/13 21:20:03 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x8, &(0x7f0000000300)) 2018/04/13 21:20:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x84000000004002) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) getpgrp(0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6ba1e6871e1804fda3a83954f325e7412229702c4322efe6319bb1dcff7c901303d7f0abac3e86e158f055aa73b271cf0e8714266c269ce1fbf93ae3cab26288", "f444ca37e53dd2f82497f8dbd8506a3393dd18a6efeb8f1b33ba4b61f65a3c5cdd050d7c08189f091521db04ce588a8796b3e20d49eb0429ff8cbd734d6cab2e", "6e1a44be6d10c4343950801e65f8f351869f87f098c18c4a0211af1e1bd42e32"}) [ 80.731035] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 21:20:04 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000b86ff4)='net/netstat\x00') sendfile(r0, r1, &(0x7f00005d4ff8), 0x2000000000000ff) 2018/04/13 21:20:04 executing program 1: r0 = socket$inet6(0xa, 0x100040000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) 2018/04/13 21:20:04 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) 2018/04/13 21:20:04 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x3, 0x2b9) sendto$inet6(r0, &(0x7f0000f72fcf), 0x0, 0x0, &(0x7f0000f5afe4)={0xa, 0x4e20}, 0x1c) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000200)}, 0x0) poll(&(0x7f0000000380)=[{r0}], 0xb1, 0x0) 2018/04/13 21:20:04 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)="a68a7b582baa95a8a4c8120f2a180d3fd6cdc9379d399a4f8b9076b03a5ae13b82396f1aea33eedf9a81ef76d566cdfcc513f6de1b534d6828aff3325d3ad028602637d6884601e82c01c75c66ec34f7df52a4a73d3d427e08f7c4a4cdcd61c098cb9854a4b21a22cd8304ed03b77588af76530aa6e25d93fa7cf9c1f8e1c10e3e54b2", 0x83, 0x0) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000037000)=@sco, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000021f03)=""/253, 0xfd}, 0x22) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140)=[{}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/13 21:20:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392de40ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be98c66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20000000, 0x2, 0x1, &(0x7f0000000000)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xb}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x1f000000, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/13 21:20:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003380)=[{{&(0x7f0000002a80)=@hci, 0x80, &(0x7f0000002b80), 0x0, &(0x7f0000002bc0)=""/138, 0x8a}}, {{&(0x7f0000002c80)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000003280), 0x0, &(0x7f0000003300)=""/104, 0x68}}], 0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xffffffffffffff53) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000400)=@getlink={0x28, 0x12, 0x209, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0xf}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:20:04 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000ae3000)) 2018/04/13 21:20:04 executing program 7: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000100)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 2018/04/13 21:20:04 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x4, &(0x7f0000000040)) socket$kcm(0x29, 0x2, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x4012}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) dup3(r0, r1, 0x0) 2018/04/13 21:20:04 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x3, 0x2b9) sendto$inet6(r0, &(0x7f0000f72fcf), 0x0, 0x0, &(0x7f0000f5afe4)={0xa, 0x4e20}, 0x1c) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000200)}, 0x0) poll(&(0x7f0000000380)=[{r0}], 0xb1, 0x0) 2018/04/13 21:20:04 executing program 1: r0 = socket$inet6(0xa, 0x100040000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) 2018/04/13 21:20:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x1000, &(0x7f0000000380)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000fdb000)='ybifs\x00', 0x1003, 0x0) [ 81.588240] ================================================================== [ 81.595668] BUG: KMSAN: uninit-value in memcmp+0x119/0x180 [ 81.601307] CPU: 0 PID: 36 Comm: kworker/0:1 Not tainted 4.16.0+ #83 [ 81.607798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.617169] Workqueue: ipv6_addrconf addrconf_dad_work [ 81.622447] Call Trace: [ 81.625047] dump_stack+0x185/0x1d0 [ 81.628683] ? memcmp+0x119/0x180 [ 81.632143] kmsan_report+0x142/0x240 [ 81.635949] __msan_warning_32+0x6c/0xb0 [ 81.640017] memcmp+0x119/0x180 [ 81.643302] __dev_mc_add+0x1c2/0x8e0 [ 81.647108] ? ndisc_mc_map+0x59f/0x8c0 [ 81.651084] dev_mc_add+0x6d/0x80 [ 81.654535] igmp6_group_added+0x2db/0xa00 [ 81.658775] ipv6_dev_mc_inc+0xe9e/0x1130 [ 81.662930] addrconf_dad_work+0x427/0x2150 [ 81.667261] ? ipv6_get_saddr_eval+0x1130/0x1130 [ 81.672023] ? ipv6_get_saddr_eval+0x1130/0x1130 [ 81.676783] process_one_work+0x12c6/0x1f60 [ 81.681106] worker_thread+0x113c/0x24f0 [ 81.685172] ? process_one_work+0x1f60/0x1f60 [ 81.689664] kthread+0x539/0x720 [ 81.693029] ? process_one_work+0x1f60/0x1f60 [ 81.697524] ? kthread_blkcg+0xf0/0xf0 [ 81.701414] ret_from_fork+0x35/0x40 [ 81.705116] [ 81.706733] Local variable description: ----buf@igmp6_group_added [ 81.712948] Variable was created at: [ 81.716661] igmp6_group_added+0x4a/0xa00 [ 81.720807] ipv6_dev_mc_inc+0xe9e/0x1130 [ 81.724940] ================================================================== [ 81.732287] Disabling lock debugging due to kernel taint [ 81.737724] Kernel panic - not syncing: panic_on_warn set ... [ 81.737724] [ 81.745090] CPU: 0 PID: 36 Comm: kworker/0:1 Tainted: G B 4.16.0+ #83 [ 81.752878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.762250] Workqueue: ipv6_addrconf addrconf_dad_work [ 81.767531] Call Trace: [ 81.770131] dump_stack+0x185/0x1d0 [ 81.773765] panic+0x39d/0x940 [ 81.776976] ? memcmp+0x119/0x180 [ 81.780432] kmsan_report+0x238/0x240 [ 81.784236] __msan_warning_32+0x6c/0xb0 [ 81.788304] memcmp+0x119/0x180 [ 81.791590] __dev_mc_add+0x1c2/0x8e0 [ 81.795395] ? ndisc_mc_map+0x59f/0x8c0 [ 81.799371] dev_mc_add+0x6d/0x80 [ 81.802822] igmp6_group_added+0x2db/0xa00 [ 81.807058] ipv6_dev_mc_inc+0xe9e/0x1130 [ 81.811207] addrconf_dad_work+0x427/0x2150 [ 81.815533] ? ipv6_get_saddr_eval+0x1130/0x1130 [ 81.820286] ? ipv6_get_saddr_eval+0x1130/0x1130 [ 81.825045] process_one_work+0x12c6/0x1f60 [ 81.829379] worker_thread+0x113c/0x24f0 [ 81.833454] ? process_one_work+0x1f60/0x1f60 [ 81.837947] kthread+0x539/0x720 [ 81.841316] ? process_one_work+0x1f60/0x1f60 [ 81.845810] ? kthread_blkcg+0xf0/0xf0 [ 81.849704] ret_from_fork+0x35/0x40 [ 81.853874] Dumping ftrace buffer: [ 81.857393] (ftrace buffer empty) [ 81.861077] Kernel Offset: disabled [ 81.864679] Rebooting in 86400 seconds..